2.4.06 V-ict (VIS)

2.4.06 V-ict (VIS)

De Paperchip®Business Method" (PP-BM) houdt een stelsel in van moderne methoden en digitale technieken, welke inzetbaar zijn bij: 
1. Alle 2 miljoen bedrijven, welke in 2022, bij de Kamer van Koophandel staan ingeschreven. Ongeacht de doelstelling of het winstoogmerk van deze bedrijven, met inbegrip van het overheidsbedrijf en het politiekbedrijf.
2. Alle 10 miljoen (aanstromende) werkers, welke volgens de CBS-statistieken nu voor 40% hoog zijn (of worden) opgeleid en voor 40% middelhoog zijn (of worden) opgeleid en voor 10% lager zijn (of worden) opgeleid. De resterende 10% is nog‘onbestemd. Deze verdeling lijkt oveirgens op een stochastische verdeling, welke een evenwichtige verdeling van de arbeidsmarkt verstoort. 
3. De ontwikkelaars van de PP-BM hebben met de steun van de 'SLIM-subsidie voor samenwerkingsverbanden' van het Ministerie voor Sociale Zaken e n Werkgelegenheid (SZW) nog in onderzoek, hoe de weg naar de PP-Arbeidmarkt voor (overmorgen) het snelst en het best kan worden bewandeld. 
4. V-ict kan de PP-Competentieprofielen van de (aanstormende) werkers matchen met de PP-Functieprofielen van de individuele bedrijven en legt zo de basis voor het LL(L)L&O-beginsel en het LL(L)L&O-perspectief. Waarbij LL(L)L&O staat voor een 'Leven Lang (Levenslusig) Leren beginsel en Ontwikkelen.   

(Team)werkers

De (team)werkers van V-ict zijn:
a) ervaringsdeskundigen bedrijfsleven
b) ict-architecten,
c) vormgevers
b) back-end en front-end programmeurs,
c) copywriters,
d) Ict stagiares en trainee's

 

Lees verder
Bedrijfs-profiel

V-ict neemt in haar manifest alvast een voorschot op het duurzaam ondernemen in een temper-economie. De bomen kunnen in onze doorgroei-economie immers niet tot aan de hemel blijven doorgroeien. in feite staat onze economie al op de snelweg van de ‘kenter-economie’ naar een ‘temper-economie. Verder staat In haar manifest het integer, het betrouwbaar, het compassievol en het beschaafd opereren hoog in het vaandel geschreven. het duurzaam, integer en betrouwbaar ondernemen hoog in haar vaandel geschreven

V-ict (VIS) is gevestigd te Broek in Waterland en verleent zakelijke diensten aan allerhande soort bedrijven in de profitsector, de non-profitsector en de semi-profitsector. KvK nummer: ......... 
VIS valt onder de V-group (VG). De VG geeft sinds 1980 bedrijfsadviezen aan het Kleinbedrijf en het Grootbedrijf. 
VIS werkt nauw samen met de VG, V-knowledge (VK), V-coaching (VC en V-advisory.

 

Lees verder
Doelgroepen

De doelgroepen van V-ict zijn: 
a) de V-groep van bedrijven,  en
b) de prospects en klanten van de V-groep van bedrijven.

 

Lees verder
Fundament

V-ict staat stevig op haar fundament met:
a) de visie dat de auromatisering van bedrijven ten dienste staat van de bedrijfsorganisatie en niet andersom,
b) de missie dat om het LLLLO-perpsectief voor (aanstormende) werkers maatschappij breed te faciliteren met e-learing-, webinars- en soortgelijke faciliteiten,
c) het doel om korte en steile leercuves e kunnen bewerkstelligen voor (aanstromende) werkers  pp-generatoren te blijven ontwikkelen waar het bedrijfsleven behoefte aan heeft, of krijgt,
d) de strategie om pp-generatoren te ontwikkelen, die maatschappij breed ingezet kunnen worden om het LLLLO-perspectief te kunnen realiseren.

 

Lees verder
ICT-world

1
Copyright 2000 – 2023 Salesforce, Inc. All rights reserved. Salesforce is a registered trademark of Salesforce, Inc., as are other
names and marks. Other marks appearing herein may be trademarks of their respective owners.
Heroku Security, Privacy and Architecture
Published: May 5, 2023
Salesforce’s Corporate Trust Commitment
Salesforce is committed to achieving and maintaining the trust of our customers. Integral to this mission is
providing a robust security and privacy program that carefully considers data protection matters across
our suite of services, including protection of Customer Data as defined in Salesforce’s MSA.
Services Covered
This documentation describes the architecture of, the security- and privacy-related audits and
certifications received for, and the administrative, technical, and physical controls applicable to the
services branded as Heroku and Salesforce Functions (including Salesforce Elastic Services) (“Heroku
Services”).
Architecture and Data Segregation
The Heroku Services are operated in a multitenant architecture that is designed to segregate and restrict
Customer Data access based on business needs. The architecture provides an effective logical data
separation for different customers via customer-specific “Organization IDs” and allows the use of
customer and user role-based access privileges. Additional data segregation is ensured by providing
separate environments for different functions, especially for testing and production.
The specific infrastructure used to host Customer Data is described in the “Infrastructure and Sub-
processors” documentation available here.
Control of Processing
Salesforce has implemented procedures designed to ensure that Customer Data is only processed as
instructed by the customer, throughout the entire chain of processing activities by Salesforce and its sub-
processors. In particular, Salesforce and its affiliates have entered into written agreements with their sub-
processors containing privacy, data protection and data security obligations that provide a level of
protection appropriate to the processing activities provided by them. Compliance with such obligations as
well as the technical and organizational data security measures implemented by Salesforce and its sub-
processors are subject to regular audits. The “Infrastructure and Sub-processors” documentation
describes the sub-processors and certain other entities material to Salesforce’s provision of the Heroku
Services.
Audits and Certifications
The following security and privacy-related audits and certifications are applicable to Heroku:
● EU and UK Binding Corporate Rules (BCR) for Processors: Customer Data submitted to the
Heroku Services is within the scope of the Salesforce EU and UK BCR for Processors. The most
current versions of the Salesforce EU and UK BCR for Processors are available on Salesforce’s
website, currently located at https://www.salesforce.com/company/privacy/.
● EU-U.S. and Swiss-U.S. Privacy Shield certification1: Customer Data submitted to the Heroku
Services is within the scope of an annual certification to the EU-U.S. Privacy Shield Framework and
the Swiss-U.S. Privacy Shield Framework as administered by the U.S. Department of Commerce, as
1 Services that are made generally available after July 16, 2020 will no longer be added to Salesforce's Privacy Shield
Certification.
2
Copyright 2000 – 2023 Salesforce, Inc. All rights reserved. Salesforce is a registered trademark of Salesforce, Inc., as are other
names and marks. Other marks appearing herein may be trademarks of their respective owners.
further described in our Privacy Shield Notice. The current certification is available at
https://www.privacyshield.gov/list by searching under “Salesforce.”
● APEC Privacy Recognition for Processors (PRP): Customer Data submitted to the Heroku Services
is within the scope of Salesforce's PRP certification under the APEC Privacy Framework. The
current certification is published in the PRP Compliance Directory at http://cbprs.org/compliance-
directory/prp/.
● TRUSTe Certification: Salesforce’s Website Privacy Statement and privacy practices related to the
Heroku Services are assessed by TRUSTe annually, for compliance with TRUSTe’s Certification and
Verification Assessment Criteria. For more information on the status of Salesforce's
certification/verification status, click here.
● ISO 27001/27017/27018 certification: Salesforce operates an information security management
system (ISMS) for the Heroku Services in accordance with the ISO 27001 international standard
and aligned to ISO 27017 and ISO 27018. Salesforce has achieved ISO 27001/27017/27018
certification for its ISMS from an independent third party. The Salesforce ISO 27001/27017/27018
Certificate and Statement of Applicability are available upon request from your organization’s
Salesforce account executive.
● EU-U.S. and Swiss-U.S. Privacy Shield certification: Customer Data submitted to the Heroku
Services is within the scope of an annual certification to the EU-U.S. Privacy Shield Framework and
the Swiss-U.S. Privacy Shield Framework as administered by the U.S. Department of Commerce, as
further described in our Privacy Shield Notice. The current certification is available at
https://www.privacyshield.gov/list by searching under “Salesforce.”
● System and Organization Controls (SOC) reports: Salesforce’s information security control
environment applicable to Heroku Services undergoes an independent evaluation in the form of a
SOC 1 (SSAE 18 / ISAE 3402), SOC 2 and SOC 3 audits. Salesforce’s most recent SOC 1 (SSAE 18 /
ISAE 3402) and SOC 2 reports are available by logging a support ticket via
https://help.heroku.com.
● Payment Card Industry (PCI): For Heroku Shield Private Spaces, Shield Dynos, and Shield Heroku
Postgres, Salesforce has obtained a signed Attestation of Compliance (“AoC”) demonstrating Level
1 compliance with the applicable Payment Card Industry Data Security Standard, as formulated by
The Payment Card Industry Security Standards Council ("PCI DSS") as a data storage entity or third-
party agent from an Qualified Security Assessor that is certified as such by The Payment Card
Industry Security Standards Council. A copy of Heroku’s AoC is available upon request from your
organization’s Salesforce account executive. Customers must use TLS 1.2 or greater when
interacting with applicable services to benefit from Salesforce’s PCI DSS AoC.
● ASIP Santé certification: Salesforce has obtained the French health data hosting certification (ASIP
Santé certification) that enables Salesforce to host French health data for the Heroku Services.
Salesforce’s most recent ASIP Santé certification is available upon request from your
organization’s Salesforce account executive.
● Information System Security Management and Assessment Program (ISMAP): ISMAP is a
program that was established to assess and register cloud services that meet security criteria
defined by the Japanese government. This audit is undertaken annually. The services covered by
ISMAP are Heroku Private Spaces, Heroku Shield Private Spaces, Heroku Shield Postgres, Heroku
Shield Dynos, Apache Kafka on Heroku, Apache Kafka on Heroku Shield, Heroku Redis, Shield
Connect / Heroku Connect, Heroku Postgres, Common Runtime, and the customer data regions
covered by ISMAP are limited to ap-northeast-1, ap-northeast-3, us-east-1, us-east2, us-west-1,
and us-west-2.
3
Copyright 2000 – 2023 Salesforce, Inc. All rights reserved. Salesforce is a registered trademark of Salesforce, Inc., as are other
names and marks. Other marks appearing herein may be trademarks of their respective owners.
The Heroku Services undergo security assessments by internal personnel and third parties, which include
infrastructure vulnerability assessments and application security assessments, on at least an annual basis.
As further described in the “Infrastructure and Sub-processors” documentation for the Heroku Services,
the infrastructure used by Salesforce to host Customer Data submitted to the Heroku Services is provided
by a third party, Amazon Web Services, Inc. (“AWS”). Information about security and privacy-related
audits and certifications received by AWS, including information on ISO 27001 certification and Service
Organization Control (SOC) reports, is available from the AWS Security Website and the AWS Compliance
Website.
Security Controls
The Heroku Services include a variety of configurable security controls that allow customers to tailor the
security of the Heroku Services for their own use. These controls include:
● Administrative access to applications built on the Heroku Services is controlled by configurable
access lists. Customers can decide which accounts have access to application logs, configuration or
data, or the ability to deploy new code.
● Each application built on the Heroku Services runs within its own isolated environment and cannot
interact with other applications or areas of the Heroku Services. This restrictive operating
environment is designed to prevent security and stability issues. These self-contained
environments isolate processes, memory, and the file system using Linux Containers (LXC) while
host-based firewalls restrict applications from establishing local network connections.
● Multi-Factor Authentication and Single Sign-On for access to the Covered Services as set forth in
the applicable Notices and License Information (NLI).
Further information about security provided by AWS is available from the AWS Security Website, including
AWS’s overview of security processes.
Security Policies and Procedures
The Heroku Services are operated in accordance with the following policies and procedures to enhance
security:
● Customer passwords are stored using a one-way salted hash.
● User access log entries will be maintained, containing date, time, user ID, resource accessed,
operation performed (created, updated, deleted), and source IP address. Note that source IP
address might not be available if NAT (Network Address Translation) or PAT (Port Address
Translation) is used by a customer or its ISP.
● If there is suspicion of inappropriate access, Salesforce can provide customers log entry records to
assist in forensic analysis. This service will be provided to customers on a time and materials basis.
● Passwords are not logged.
● Salesforce personnel will not set a defined password for a user. If a user requests a password
reset, Salesforce will deliver a temporarily valid, secret URL to the requesting user via email. A
new password is set by visiting this URL.
Intrusion Detection
Salesforce, or an authorized independent third party, monitors the Heroku Services for unauthorized
intrusions using network-based and/or host-based intrusion detection mechanisms. Salesforce may
analyze data collected by users' web browsers (e.g., device type, screen resolution, time zone, operating
system version, browser type and version, system fonts, installed browser plug-ins, enabled MIME types,
4
Copyright 2000 – 2023 Salesforce, Inc. All rights reserved. Salesforce is a registered trademark of Salesforce, Inc., as are other
names and marks. Other marks appearing herein may be trademarks of their respective owners.
etc.) for security purposes including to detect compromised browsers, to prevent fraudulent
authentications, and to ensure that the Heroku Services function properly.
Salesforce may conduct security scans and testing of customer code uploaded to the Heroku Services to
detect abusive behavior or actions that violate terms for the Heroku Services.
Security Logs
All Salesforce systems used in the provision of the Heroku Services log information to their respective
system log facilities or a centralized logging service (for network systems) in order to enable security
reviews and analysis.
Incident Management
Salesforce maintains security incident management policies and procedures. Salesforce notifies impacted
customers without undue delay of any unauthorized disclosure of their respective Customer Data by
Salesforce or its agents of which Salesforce becomes aware to the extent permitted by law.
User Authentication
Access to the Heroku Services requires a valid user ID and password combination, which are encrypted via
SSL/TLS while in motion and passwords are stored using a one-way salted hash. Alternatively, Heroku
supports Single Sign On (SSO) utilizing SAML 2.0 which uses Public Key Encryption and does not require
Heroku to store a password. Following a successful authentication, a randomly generated credential is
transmitted to the user’s browser or command line interface (CLI). All subsequent requests are
authenticated with that credential.
Physical Security
Production data centers used to provide the Heroku Services have access system controls in place. These
systems permit only authorized personnel to have access to secure areas. These facilities are designed to
withstand adverse weather and other reasonably predictable natural conditions, are secured by around-
the-clock guards, two-factor access screening, and escort-controlled access, and are also supported by on-
site back-up generators in the event of a power failure.
Reliability and Backup
Applications deployed on the Heroku Services and Customer Data submitted to the Heroku Services, up to
the last committed transaction, are automatically replicated on a near real-time basis at the database
layer and are backed up as part of the deployment process on secure, access controlled, and redundant
storage.
Disaster Recovery
The Heroku Services utilize disaster recovery facilities that are geographically diverse from their primary
data centers, along with required hardware, software, and Internet connectivity, in the event production
facilities at the primary data centers were to be rendered unavailable.
Salesforce has disaster recovery plans in place and tests them at least once per year. The scope of the
disaster recovery exercise is to validate the ability to failover a production instance from the primary data
center to a secondary data center utilizing developed operational and disaster recovery procedures and
documentation.
5
Copyright 2000 – 2023 Salesforce, Inc. All rights reserved. Salesforce is a registered trademark of Salesforce, Inc., as are other
names and marks. Other marks appearing herein may be trademarks of their respective owners.
For (1) Heroku Postgres and Heroku Redis plans that include the ‘High Availability’ option, (2) Heroku
Private Spaces, and (3) Heroku Shield services*, there are disaster recovery plans with the following target
recovery objectives: (a) restoration of the applicable Heroku Service within 12 hours after Salesforce’s
declaration of a disaster; and as applicable, (b) maximum Customer Data loss of 4 hours; excluding,
however, a disaster or multiple disasters causing the compromise of multiple Availability Zones at the
same time.
*Heroku Shield services include: Heroku Shield Private Spaces, Shield Dynos, Shield Heroku Postgres,
Shield Connect, and Apache Kafka on Heroku Shield.
Viruses
Salesforce implements practices and software to limit the risk of exposure to software viruses. The Heroku
Services do not scan for viruses or other malware that could be included in attachments or other
Customer Data uploaded into the Heroku Services by a customer.
Data Encryption
TLS is available as an option to be enabled for any web application running on the Heroku Services.
Customer connections to Postgres databases via the Heroku Services require SSL encryption. Selected
Heroku Postgres plans, as indicated in the Documentation, include encryption at rest.
Return of Customer Data
During the term of the agreement, customers may make copies of their respective Customer Data
submitted to the Heroku Services by following instructions here, here, or contacting
support@heroku.com.
Deletion of Customer Data
Upon final termination of a customer database for any reason (such as account termination, customer
deletion of the database, or other reason), Customer Data submitted to the Heroku Services is deleted
within 30 days. This process is subject to applicable legal requirements.
Sensitive Data
Important: Customers must use Heroku Shield Private Spaces, Shield Dynos, and Shield Heroku Postgres
when submitting payment cardholder data and authentication data, credit or debit card numbers, or any
security codes to the Heroku Services in accordance with the PCI Data Security Standard and Heroku’s PCI
customer responsibility matrix. Customers may not otherwise submit such data to the Heroku Services.
Government issued identification numbers or bank account numbers may be submitted only to Heroku
Private Spaces or Heroku Shield services (Heroku Shield services are identified in the “Disaster Recovery”
section above). Customers may not otherwise submit such data to the Heroku Services.
Additionally, for the Heroku Services, the following types of sensitive personal data may not be submitted:
personal health information, where Customer is a health care provider, health care clearinghouse, health
plan, or an entity performing functions on behalf of such entities, except in limited circumstances where,
subject to restrictions, Salesforce has expressly permitted such submission contractually.
If Customer does submit personal health information or other sensitive or regulated data to the Heroku
Services, then Customer is responsible for ensuring that its use of the Heroku Services to process that
information complies with all applicable laws and regulations.
6
Copyright 2000 – 2023 Salesforce, Inc. All rights reserved. Salesforce is a registered trademark of Salesforce, Inc., as are other
names and marks. Other marks appearing herein may be trademarks of their respective owners.
PGSSI-S. To the extent Customer is subject to Article L.1111-8 (or any successor thereto) of the French
public health code (Code de la Santé Publique), Customer shall abide by the Global Information Security
Policy for the Healthcare Sector (PGSSI-S) pursuant to Article L.1110-4-1 (or any successor thereto) of the
aforementioned code.
For clarity, the foregoing restrictions do not apply to financial information provided to Salesforce for the
purposes of checking the financial qualifications of, and collecting payments from, customers, the
processing of which is governed by Salesforce’s Website Privacy Statement.
Analytics
Salesforce may track and analyze the usage of the Heroku Services for purposes of security and helping
Salesforce improve both the Heroku Services and the user experience in using the Heroku Services. For
example, we may use this information to understand and analyze trends or track which of our features are
used most often to improve product functionality.
Salesforce may share anonymous usage data with Salesforce’s service providers for the purpose of helping
Salesforce in such tracking, analysis, and improvements. Additionally, Salesforce may share such
anonymous usage data on an aggregate basis in the normal course of operating our business; for example,
we may share information publicly to show trends about the general use of our services.
Interoperation with Other Services
The Heroku Services may interoperate or integrate with other services provided by Salesforce or third
parties. Security, Privacy and Architecture documentation for services provided by Salesforce is available
in the Trust and Compliance Documentation. Salesforce also provides a variety of platforms and features
that allow Salesforce users to learn about Salesforce products, participate in communities, connect third-
party applications, and participate in pilots, testing, and assessments, which are outside the scope of this
documentation. Salesforce may communicate with users that participate in such platforms and features in
a manner consistent with our Privacy Statement. Additionally, Salesforce may contact users to provide
transactional information about the Heroku Services; for instance, through the Adoption Manager
program or through system-generated messages, such as Chatter notifications. Salesforce offers
customers and users the ability to deactivate or opt out of receiving such messages.

 

Lees verder
Kernactiviteiten

De kernactiviteiten van V-ict o.m.:
a) het ontwikkelen met de pp-bm generator van: besloten websites met intranet en backoffices en openbare public relations en rmarketing websites, 
b) het ontwikkelen met de pp-bm generatoren voor: bedrijfsorganisatie-bomen, digitale archieven, werkprocessen met kennis omzetten naar, werkdossiers, met planning-, verslaglegging- en werkvloerkennis-feedback mechanismen, ,
c  het ontwikkelen van de pp-bm generatoren voor: het matchen van bedrijfs-functie-profielen met de competentie-profielen van (aanstormende) werkers,
d) het ontwikkelen van specifieke front-offices voor de openbare websites en back-offices voor het intranet, 
e) het onderhouden, beheren en beveiligen en hosten van websites en intranetten

 

Lees verder
Stakeholders

De stakeholders van V-ict zijn:
a) de UBO's, toezichthouders, beslissers, sleutelfunctionarissen en (in)directe (teamwerkers),
b) de politiek en de overheid,
c) de generalisten en specialisten

 

Lees verder
Verantwoording

Trust and Compliance Documentation 

Find Trust and Compliance information for each Salesforce service.

 

What's included in the Trust & Compliance documentation? 

The Security, Privacy, and Architecture (“SPARC”), which describes:

  • The architecture of the services,
  • The security and privacy related audits and certifications received for the services, and
  • The administrative, technical and physical controls applicable to these services

The Notices and License Information (“NLI”) which describes the features, restrictions and notices associated with any:

  • Information sourced from third parties or public sources and provided to customers via these services
  • Functionality that allows customers to interact with social media, other websites, and/or non-Salesforce applications, including licensor terms, and
  • Desktop and mobile device software applications provided in connection with these services

The Infrastructure & Sub-processors (“I&S”) which:

  • Describes the infrastructure environment for the services,
  • Lists the sub-processors and certain other entities material to Salesforce's provision of these services, and
  • Lists the countries where customer data is stored and processed for these services

The Product Terms Directory (“PTD”) which: 

  • Sets forth certain terms associated with Services purchased on Order Forms, and
  • Organizes terms by the name of the particular Service as it appears on the Order Form.

 

Updates to the Trust & Compliance Documentation 

Updates to the SPARC, NLI, and I&S Documentation are reflected in the Change Log.

For notifications of new sub-processors click here to subscribe.

Updates to the PTD are reflected in the previous versions of PTD accessible directly from the PTD

For any additional notices required by licensors related to distributed components of the services see the Open Source Notices website. 

 

How to Find Your Trust & Compliance Documentation 

To find the SPARC or NLI Documentation applicable to your Services, locate your Service and Infrastructure to find the SPARC and NLI for that Service. Some Services can run on Hyperforce, or alternative infrastructure. To confirm which Infrastructure your organization is running on, see Where is my Salesforce instance located? and View instance information for your Salesforce Organization

Some Services run on multiple infrastructures and are subject to more than one set of SPARC or NLI documentation. The Scope or Covered Services section of each SPARC or NLI document sets forth those Services or features that are covered by additional documentation.

All Services share a common I&S document to make it easier to find all of the entities that host or process data for our Services. 

To find the PTD Documentation applicable to your Service, locate your Service in the PTD.

 

Salesforce Services and Additional Services 

 

  • Automotive Cloud
  • Backup and Restore, a feature of Lightning Platform (including Force.com) 
  • B2B Commerce on Lightning Experience
  • D2C Commerce (formerly B2B2C Commerce)
  • Chatter 
  • Consumer Goods Cloud 
  • Communications Cloud
  • CRM Analytics (formerly Tableau CRM) (including Einstein Discovery and Salesforce Data Pipelines)
  • Customer Data Cloud
  • Database.com 
  • DevOps Center
  • Digital Process Automation (including Decision Tables, Data Processing Engine, Omnistudio, Business Rules Engine, Client-Side Document Generation, and Server-Side Document Generation)
  • Emergency Program Management 
  • Employee Productivity (formerly IT Service Center — Agent and Employee Service — Agent) 
  • Enablement
  • Energy and Utilities Cloud
  • Enhanced Messaging
  • Experience Cloud (formerly Community Cloud) 
  • Financial Services Cloud 
  • Health Cloud
  • IoT Explorer (including IoT Plus)
  • Intelligent Form Reader 
  • Lightning Platform (including Force.com and Salesforce Connect) 
  • Loyalty Management 
  • Manufacturing Cloud 
  • Media Cloud
  • Messaging 
  • Messaging for In-App and Web 
  • Net Zero Cloud (formerly Sustainability Cloud) 
  • Privacy Center 
  • Public Sector Solutions

 

  • Safety Cloud
  • Sales Cloud
  • Service Cloud (including Field Services managed package)
  • Salesforce Contracts
  • Salesforce Private Connect
  • Salesforce CPQ and Salesforce Billing
  • Salesforce Maps
  • Salesforce Order Management
  • Service Cloud
  • Service Cloud Voice
  • Salesforce Sales Planning
  • Salesforce Web3 Services (including Web3 Connect and NFT Management)
  • Shift Management
  • Subscription Management
  • Site.com
  • Vlocity managed packages and features (“Vlocity Services”) branded as:
    • Vlocity Communication package
    • Vlocity Media and Entertainment package,
    • Vlocity Energy & Utilities package,
    • Vlocity Insurance package,
    • Vlocity Health package,
    • Vlocity Public Sector or Vlocity Government package,
    • Vlocity Digital Commerce Gateway
    • Vlocity Order Management Plus               
  • WDC
  • Workforce Engagement Management
  • Workplace Command Center
  • the Salesforce.org services branded as:
    • Accounting Subledger
    • Admissions Connect
    • Education Cloud
    • foundationConnect (provisioned on or after August 19, 2019)
    • Grants Management
    • Nonprofit Cloud
    • Nonprofit Cloud Case Management 1
    • Nonprofit Cloud for Grantmaking
    • Salesforce.org Insights Platform: Data Integrity
    • Student Success Hub (formerly Salesforce Advisor Link)

 

 

Trust & Compliance Documentation

Trust & Compliance Documentation for Hyperforce (formerly Salesforce Unified Cloud)

 

Audience Studio and Data Studio (formerly branded as Krux) 

 

Trust & Compliance Documentation

 

B2B Commerce 

 

Trust & Compliance Documentation

Trust & Compliance Documentation for Hyperforce (formerly Salesforce Unified Cloud)

 

B2C Commerce/Commerce Cloud 

 

Trust & Compliance Documentation

 

Customer 360 Data Manager 

 

Trust & Compliance Documentation 

 

Customer Data Cloud (aka Salesforce Data Cloud), Customer Data Platform (formerly branded as Salesforce CDP) 

 

Trust & Compliance Documentation

 

Data.com 

 

Trust & Compliance Documentation

 

Einstein Platform 

 

  • Einstein Bots
  • Einstein Conversation Insights
  • Einstein Copy Insights
  • Einstein GPT for Sales
  • Einstein GPT for Service
  • Einstein Prediction Builder
  • Einstein Vision and Language
  • Einstein Vision for Social Studio
  • Sales Engagement (formerly High Velocity Sales)
  • Pardot Einstein
  • Sales Cloud Einstein
  • Salesforce Inbox
  • Service Cloud Einstein
  • the Einstein Features
    • Activity Capture
    • Article Recommendations
    • Bots
    • Case Classification
    • Case Wrap-up
    • Deal Insights
    • Intelligent Forecasting Machine Learning
    • Object Detection
    • Opportunity Scoring
    • Prediction Builder
    • Recommendation Builder
    • Reply Recommendation

 

 

Trust & Compliance Documentation

 

Government Cloud Plus 

 

Trust & Compliance Documentation

 

Heroku 

 

  • Heroku
  • Salesforce Functions (including Salesforce Elastic Services)

 

Trust & Compliance Documentation

 

LiveMessage, Sales Enablement (formerly branded as myTrailhead), Quip, Salesforce.org Philanthropy Cloud and Salesforce.org Elevate 

 

Trust & Compliance Documentation

 

Marketing Cloud 

 

  • Marketing Cloud Advertising (including Advertising Audiences and Journey Builder Advertising)
  • Evergage
  • Marketing Cloud Engagement (formerly ExactTarget) (including Email Studio, Journey Builder and Mobile Studio)
  • Intelligence (including Intelligence Data Pipelines) (formerly Datorama)
  • Intelligence Reports for Engagement (formerly Datorama Reports)
  • Interaction Studio (legacy)
  • Marketing Cloud Personalization (formerly Interaction Studio) 
  • Marketing Cloud Einstein services branded as
    • Behavioral Triggers
    • Einstein Content Selection
    • Einstein Content Tagging
    • Einstein Copy Insights
    • Einstein Email Recommendations
    • Einstein Engagement Frequency
    • Einstein Engagement Frequency for Pardot
    • Einstein Engagement Scoring for Email (formerly branded as Predictive Scoring)
    • Einstein Engagement Scoring for Mobile
    • Einstein Messaging Insights
    • Einstein Recommendations
    • Einstein Send Time Optimization for Marketing Cloud
    • Einstein Send Time Optimization for Pardot
    • Personalization Builder
    • Predictive Email
    • Predictive Intelligence
    • Predictive Web
    • Web Personalization
  • Marketing Cloud Engagement for Nonprofits
  • Social Studio 

 

 

Trust & Compliance Documentation

Trust & Compliance Documentation for Hyperforce (formerly Salesforce Unified Cloud)

 

Marketing Cloud Account Engagement (formerly Pardot) 

 

  • Marketing Cloud Account Engagement (formerly Pardot)
  • Einstein Engagement Frequency for Marketing Cloud Account Management
  • Einstein Send Time Optimization for Marketing Cloud Account Management

 

 

Trust & Compliance Documentation

 

MuleSoft 

 

  • MuleSoft or the Anypoint Platform
  • MuleSoft Composer
  • MuleSoft Robotic Process Automation (RPA)

 

 

Trust & Compliance Documentation

 

Slack 

 

  • Slack 
  • GovSlack

 

Trust & Compliance Documentation

 

Tableau Cloud 

 

Trust & Compliance Documentation

 

Salesforce Infrastructure & Sub-processors Documentation 

 

Salesforce I&S (2023-08-15)

 

 

Salesforce Home 

Facebook Twitter LinkedIn Instagram YouTube 

Call us at 1-800-664-9073 

See all ways to contact us > 

New to Salesforce? 

About Salesforce 

Popular Links 

 

Lees verder
Voorwoord

Vertimart Information Systems B.V. ontwikkelt en implementeert software voor het totale (maatschappelijk) bedrijfsleven, ongeacht grootte of winstoogmerk, het politiek- en overheidsbedrijf inbegrepen. V-ict is een deelneming van Vertimar Group B.V. en (sub)licentiehouder van de Paperchip(r) Business Method (PP-BM). V-ict exploiteert ook het ICT-park (3.6).

20-10-23 Xander. Goede vraag, en nog wel vertrouwelijk en wel zo'n beetje de dunne Paperchipworld met de infrastructuur voor een betere wereld en de bestrijding van de (verborgen) armoede! 🙃😇😌😉🥰
De kern van alles is de Paperchip(r) Business Method (c), afgekort tot (PP-BM), of (PP). Een stelsel van moderne methoden en (digitale) technieken. Met als kern de PP-Werkproces matrixen. Voorzien van naar keus: praktische-, pragmatische-, of theoretische PP-Kennis en andere handige parameters om al het werk, in elk bedrijf, vroeg of laat, uit te kunnen (laten) voeren door (aanstormende) werkers (Paperchippers), wie dat specifieke werk op het lijf staat geschreven, of kan worden geschreven. Samenhangende PP-Werkprocessen vormen de (imaginaire) de PP-Subafdelingen en de PP-Afdelingen en samenhangende PP-Afdelingen vormen één van de 14 PP-Organisatiesectoren van elk PP-Bedrijf dat op die wijze door de V-groep van bedrijven wordt georganiseerd. Dat lijkt complex, maar om die reden bestaat de V-groep van bedrijven, met ieder z'n eigen PP-Kernactiviteiten. Deze bedrijven zijn: V-Knowledge, met een eigen PP-Kennispark , V-coaching met een eigen PP-Coachingpark en een eigen PP-Banenpark. V-advisory, met een eigen Bedrijvenpark, V-ict met een eigen ICT-park, V-Pavillion & Compliance, met een eigen Multimediapark, V-design i.o. met een eigen Tripscriptingpark, V-dominopoly, met een eigen Trainingsgamepark en V-partners, met een eigen Partnerpark.

Zeker chillen!! Ik ga ook zo naar de buren aan het gelach. Beschrijf snel ook nog wel even PP-Bedrijfskennisboom met de 14 PP-Organisatiesectoren, met gemiddeld 10 PP-Afdelingen (samen met de sub afdelingen). En aan al die vertakkingen hangen dan gemiddeld  een 5-tot 10-tal PP-BM Werkproces matrixen. De Boomstructuur kent nu gekleurde symbooltjes, wat m.i. voldoende is.

 

Lees verder